FreeBSD : xen-kernel -- Certain domctl operations may be abused to lock up the host (103a47d5-27e7-11e5-a4a5-002590263bf5)

high Nessus Plugin ID 84694

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Xen Project reports :

XSA-77 put the majority of the domctl operations on a list excepting them from having security advisories issued for them if any effects their use might have could hamper security. Subsequently some of them got declared disaggregation safe, but for a small subset this was not really correct: Their (mis-)use may result in host lockups.

As a result, the potential security benefits of toolstack disaggregation are not always fully realised.

Domains deliberately given partial management control may be able to deny service to the entire host.

As a result, in a system designed to enhance security by radically disaggregating the management, the security may be reduced. But, the security will be no worse than a non-disaggregated design.

Solution

Update the affected package.

See Also

http://xenbits.xen.org/xsa/advisory-127.html

http://www.nessus.org/u?4719bc83

Plugin Details

Severity: High

ID: 84694

File Name: freebsd_pkg_103a47d527e711e5a4a5002590263bf5.nasl

Version: 2.4

Type: local

Published: 7/14/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: High

Base Score: 7.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xen-kernel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/11/2015

Vulnerability Publication Date: 3/31/2015

Reference Information

CVE: CVE-2015-2751